Edge Computing for Real Time Botnet Propagation Detection

M. Gromov, David Arnold, J. Saniie
{"title":"Edge Computing for Real Time Botnet Propagation Detection","authors":"M. Gromov, David Arnold, J. Saniie","doi":"10.1109/RTC56148.2022.9945060","DOIUrl":null,"url":null,"abstract":"Continued growth and adoption of the Internet of Things (IoT) has greatly increased the number of dispersed resources within both corporate and private networks. IoT devices benefit the user by providing more local access to computation and observation compared to dedicated servers within a centralized data center. However, years of lax or nonexistent cybersecurity standards leave IoT devices as easy prey for hackers looking for easy targets. Further, IoT devices normally operate at the edge of the network, far from sophisticated cyberattack detection and network monitoring tools. When hacked, IoT can be used as a launching point to attack more sensitive targets or can be collected into a larger botnet. These botnets are frequently utilized for targeted Distributed Denial of Service (DDoS) attacks against service providers and servers, decreasing response time or overwhelming the system. In order to protect these vulnerable resources, we propose an edge computing system for detecting active threats against local IoT devices. Our system will utilize deep learning, specifically a Convolutional Neural Network (CNN) for detecting attacks. Incoming network traffic will be converted into an image before beings supplied to the CNN for classification. The network will be trained using the N-BaIoT dataset. Since the system is designed to operate at the edge of the network, it will run on the Jetson Nano for real-time attack detection.","PeriodicalId":437897,"journal":{"name":"2022 IEEE International Conference and Expo on Real Time Communications at IIT (RTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference and Expo on Real Time Communications at IIT (RTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTC56148.2022.9945060","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Continued growth and adoption of the Internet of Things (IoT) has greatly increased the number of dispersed resources within both corporate and private networks. IoT devices benefit the user by providing more local access to computation and observation compared to dedicated servers within a centralized data center. However, years of lax or nonexistent cybersecurity standards leave IoT devices as easy prey for hackers looking for easy targets. Further, IoT devices normally operate at the edge of the network, far from sophisticated cyberattack detection and network monitoring tools. When hacked, IoT can be used as a launching point to attack more sensitive targets or can be collected into a larger botnet. These botnets are frequently utilized for targeted Distributed Denial of Service (DDoS) attacks against service providers and servers, decreasing response time or overwhelming the system. In order to protect these vulnerable resources, we propose an edge computing system for detecting active threats against local IoT devices. Our system will utilize deep learning, specifically a Convolutional Neural Network (CNN) for detecting attacks. Incoming network traffic will be converted into an image before beings supplied to the CNN for classification. The network will be trained using the N-BaIoT dataset. Since the system is designed to operate at the edge of the network, it will run on the Jetson Nano for real-time attack detection.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
边缘计算实时僵尸网络传播检测
物联网(IoT)的持续增长和采用大大增加了企业和专用网络中分散资源的数量。与集中式数据中心内的专用服务器相比,物联网设备通过提供更多的本地计算和观察访问,从而使用户受益。然而,多年来宽松或不存在的网络安全标准使物联网设备成为黑客寻找简单目标的容易猎物。此外,物联网设备通常在网络边缘运行,远离复杂的网络攻击检测和网络监控工具。当被黑客攻击时,物联网可以作为攻击更敏感目标的起点,或者可以收集到更大的僵尸网络中。这些僵尸网络经常用于针对服务提供商和服务器的有针对性的分布式拒绝服务(DDoS)攻击,减少响应时间或使系统不堪重负。为了保护这些易受攻击的资源,我们提出了一种边缘计算系统来检测针对本地物联网设备的主动威胁。我们的系统将利用深度学习,特别是卷积神经网络(CNN)来检测攻击。传入的网络流量将被转换成图像,然后提供给CNN进行分类。网络将使用N-BaIoT数据集进行训练。由于该系统被设计为在网络边缘运行,因此它将在Jetson Nano上运行以进行实时攻击检测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Image Processing for Detecting Botnet Attacks: A Novel Approach for Flexibility and Scalability Edge Computing for Real Time Botnet Propagation Detection Maximizing Stable Throughput in Age of Information-Based Cognitive Radio
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1